The Wayback Machine - https://web.archive.org/web/20170909052333/http://csrc.nist.gov:80/groups/ST/toolkit/examples.html

In September 2017, this (legacy) site will be replaced with the new site you can see at beta.csrc.nist.gov. At that time, links to this legacy site will be automatically redirected to apporpriate links on the new site.

View the beta site
NIST Logo and ITL BannerLink to the NIST HomepageLink to the ITL HomepageLink to the NIST Homepage

EXAMPLE ALGORITHMS

The following is a list of algorithms with example values for each algorithm. This list may not always accurately reflect all Approved* algorithms. Please refer to the actual algorithm specification pages for the most accurate list of algorithms. Links for each cryptographic primative are provided below, or go directly to the CryptoToolkit Home Page.


Back to Top

Encryption - Block Ciphers

Visit the Block Ciphers Page

FIPS 197 - Advanced Encryption Standard (AES)

SP 800-67 - Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher

FIPS 185 - Escrowed Encryption Standard containing the Skipjack algorithm


Back to Top

Block Cipher Modes

Visit the Block Cipher Modes Page

SP 800-38A - Recommendation for Block Cipher Modes of Operation: Methods and Techniques

SP 800-38B - Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication

SP 800-38C - Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality

SP 800-38D - Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC

SP 800-38F - Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping

SP 800-38G -Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption


Back to Top

Digital Signatures

Visit the Digital Signatures Page

FIPS 186-4 - Digital Signature Standard


Back to Top

Secure Hashing

Visit the Secure Hashing Page

FIPS 180-2 - Secure Hash Standard


FIPS 202 - SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

 Input Message Length
0-bit5-bit30-bit1600-bit1605-bit1630-bit
SHA3-224filefilefilefilefilefile
SHA3-256filefilefilefilefilefile
SHA3-384filefilefilefilefilefile
SHA3-512filefilefilefilefilefile
SHAKE128filefilefilefilefilefile
SHAKE256filefilefilefilefilefile

Samples to illustrate SHAKE128 for output bit lengths that are not divisible by 8.


SP 800-185 - SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash, and ParallelHash

Back to Top

Key Management

Visit the Key Management Page

SP 800-56A - Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logorithm Cryptography

  • Finite Field Cryptography based Samples
    • All Domain Parameter Sizes
  • Elliptic Curve Cryptography

Back to Top

Random Number Generation

Visit the Random Number Generation Page

Deterministic Generators


Back to Top

Message Authentication

Visit the Message Authentication Page

FIPS 198 - The Keyed-Hash Message Authentication Code (HMAC)


Note: An algorithm or technique that is either specified in a FIPS or NIST Recommendation.
close